/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
pk7_attr.c | 99 X509_ALGOR *alg; local 101 if(!(alg = X509_ALGOR_new())) { 105 ASN1_OBJECT_free(alg->algorithm); 106 alg->algorithm = OBJ_nid2obj (nid); 109 if(!(alg->parameter = ASN1_TYPE_new())) { 121 alg->parameter->value.integer = nbit; 122 alg->parameter->type = V_ASN1_INTEGER; 124 sk_X509_ALGOR_push (sk, alg);
|
/external/ipsec-tools/src/racoon/ |
sainfo.h | 66 int alg; member in struct:sainfoalg
|
/external/openssl/crypto/pkcs7/ |
pk7_attr.c | 99 X509_ALGOR *alg; local 101 if(!(alg = X509_ALGOR_new())) { 105 ASN1_OBJECT_free(alg->algorithm); 106 alg->algorithm = OBJ_nid2obj (nid); 109 if(!(alg->parameter = ASN1_TYPE_new())) { 121 alg->parameter->value.integer = nbit; 122 alg->parameter->type = V_ASN1_INTEGER; 124 sk_X509_ALGOR_push (sk, alg);
|
/external/apache-harmony/crypto/src/test/support/common/java/org/apache/harmony/crypto/tests/support/ |
MyExemptionMechanismSpi.java | 101 private String alg; field in class:MyExemptionMechanismSpi.tmpKey 103 public tmpKey(String alg, byte[] enc) { 104 this.alg = alg; 111 return alg; 120 public tmp1Key(String alg, byte[] enc) {
|
/external/chromium_org/third_party/openssl/openssl/crypto/ocsp/ |
ocsp_lib.c | 106 X509_ALGOR *alg; local 112 alg = cid->hashAlgorithm; 113 if (alg->algorithm != NULL) ASN1_OBJECT_free(alg->algorithm); 119 if (!(alg->algorithm=OBJ_nid2obj(nid))) goto err; 120 if ((alg->parameter=ASN1_TYPE_new()) == NULL) goto err; 121 alg->parameter->type=V_ASN1_NULL;
|
/external/openssl/crypto/ocsp/ |
ocsp_lib.c | 106 X509_ALGOR *alg; local 112 alg = cid->hashAlgorithm; 113 if (alg->algorithm != NULL) ASN1_OBJECT_free(alg->algorithm); 119 if (!(alg->algorithm=OBJ_nid2obj(nid))) goto err; 120 if ((alg->parameter=ASN1_TYPE_new()) == NULL) goto err; 121 alg->parameter->type=V_ASN1_NULL;
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal.c | 18 enum crypto_hash_alg alg; member in struct:crypto_hash 31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, 43 ctx->alg = alg; 45 switch (alg) { 130 switch (ctx->alg) { 164 switch (ctx->alg) {
|
crypto_internal-cipher.c | 18 enum crypto_cipher_alg alg; member in struct:crypto_cipher 43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, 53 ctx->alg = alg; 55 switch (alg) { 108 switch (ctx->alg) { 172 switch (ctx->alg) { 232 switch (ctx->alg) {
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/support/ |
MyExemptionMechanismSpi.java | 108 private String alg; field in class:MyExemptionMechanismSpi.tmpKey 110 public tmpKey(String alg, byte[] enc) { 111 this.alg = alg; 118 return alg; 127 public tmp1Key(String alg, byte[] enc) {
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
AlgorithmParameterGenerator3Test.java | 56 String alg = AlgorithmParameterGenerator.getInstance("DSA") local 58 assertEquals("getAlgorithm ok", "DSA", alg);
|
KeyPairGenerator4Test.java | 45 String alg = KeyPairGenerator.getInstance("DSA").getAlgorithm(); local 46 assertEquals("getAlgorithm returned unexpected value", "DSA", alg);
|
KSPrivateKeyEntryTest.java | 186 private String alg = "My algorithm"; field in class:KSPrivateKeyEntryTest.tmpPrivateKey 189 return alg; 205 alg = algorithm;
|
/external/chromium/chrome/browser/importer/ |
nss_decryptor_system_nss.cc | 87 SECAlgorithmID alg; member in struct:SDRResult 95 { SEC_ASN1_INLINE | SEC_ASN1_XTRN, offsetof(SDRResult, alg), 197 params = PK11_ParamFromAlgid(&sdrResult.alg);
|
/external/chromium_org/chrome/utility/importer/ |
nss_decryptor_system_nss.cc | 90 SECAlgorithmID alg; member in struct:SDRResult 98 { SEC_ASN1_INLINE | SEC_ASN1_XTRN, offsetof(SDRResult, alg), 200 params = PK11_ParamFromAlgid(&sdrResult.alg);
|
/external/smack/src/org/xbill/DNS/ |
DLVRecord.java | 26 private int alg; field in class:DLVRecord 40 * @param alg The original key algorithm. 45 DLVRecord(Name name, int dclass, long ttl, int footprint, int alg, 50 this.alg = checkU8("alg", alg); 58 alg = in.readU8(); 66 alg = st.getUInt8(); 79 sb.append(alg); 95 return alg; [all...] |
SSHFPRecord.java | 31 private int alg; field in class:SSHFPRecord 44 * @param alg The public key's algorithm. 49 SSHFPRecord(Name name, int dclass, long ttl, int alg, int digestType, 53 this.alg = checkU8("alg", alg); 60 alg = in.readU8(); 67 alg = st.getUInt8(); 75 sb.append(alg); 86 return alg; [all...] |
TKEYRecord.java | 21 private Name alg; field in class:TKEYRecord 52 * @param alg The shared key's algorithm 64 TKEYRecord(Name name, int dclass, long ttl, Name alg, 69 this.alg = checkName("alg", alg); 80 alg = new Name(in); 120 sb.append(alg); 155 return alg; 202 alg.toWire(out, null, canonical) [all...] |
TSIGRecord.java | 23 private Name alg; field in class:TSIGRecord 41 * @param alg The shared key's algorithm 54 TSIGRecord(Name name, int dclass, long ttl, Name alg, Date timeSigned, 59 this.alg = checkName("alg", alg); 70 alg = new Name(in); 100 sb.append(alg); 156 return alg; 197 alg.toWire(out, null, canonical) [all...] |
/external/wpa_supplicant_8/src/tls/ |
pkcs5.c | 22 } alg; member in struct:pkcs5_params 67 params->alg = pkcs5_get_alg(&oid); 68 if (params->alg == PKCS5_ALG_UNKNOWN) { 147 if (params->alg != PKCS5_ALG_MD5_DES_CBC)
|
/libcore/luni/src/main/java/org/apache/harmony/security/provider/crypto/ |
DSAPrivateKeyImpl.java | 105 String alg, algName; local 141 alg = ai.getAlgorithm(); 142 algName = AlgNameMapper.map2AlgName(alg); 143 setAlgorithm(algName == null ? alg : algName);
|
DSAPublicKeyImpl.java | 111 String alg, algName; local 145 alg = ai.getAlgorithm(); 146 algName = AlgNameMapper.map2AlgName(alg); 147 setAlgorithm(algName == null ? alg : algName);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyPairGenerator3Test.java | 140 String[] alg = {null, "", "AsDfGh!#$*", "DSA", "RSA"}; local 143 for (int i = 0; i < alg.length; i++) { 145 kpg = new MykeyPGen(alg[i]); 158 public MykeyPGen(String alg) { 159 super(alg);
|
KeyPairGenerator4Test.java | 43 String alg = KeyPairGenerator.getInstance("DSA").getAlgorithm(); local 44 assertEquals("getAlgorithm returned unexpected value", "DSA", alg);
|
/external/chromium/crypto/ |
symmetric_key_win.cc | 45 // key created for the specified |provider|. |alg| contains the algorithm of 47 // If |key_data| is intended to be used as an HMAC key, then |alg| should be 52 ALG_ID alg, 67 key_header->hdr.aiKeyAlg = alg; 73 if (alg == CALG_HMAC) { 105 ALG_ID alg = GetAESAlgIDForKeySize(key_size_in_bits); local 106 if (alg == 0) 124 ok = CryptGenKey(safe_provider.get(), alg, CRYPT_EXPORTABLE, 136 // Section 3. |alg| is the hash function used in the HMAC. 137 bool CheckHMACKeySize(size_t key_size_in_bits, ALG_ID alg) { 367 ALG_ID alg = 0; local 467 ALG_ID alg = 0; local [all...] |
/external/chromium_org/crypto/ |
symmetric_key_win.cc | 44 // key created for the specified |provider|. |alg| contains the algorithm of 46 // If |key_data| is intended to be used as an HMAC key, then |alg| should be 51 ALG_ID alg, 67 key_header->hdr.aiKeyAlg = alg; 73 if (alg == CALG_HMAC) { 105 ALG_ID alg = GetAESAlgIDForKeySize(key_size_in_bits); local 106 if (alg == 0) 124 ok = CryptGenKey(safe_provider.get(), alg, CRYPT_EXPORTABLE, 136 // Section 3. |alg| is the hash function used in the HMAC. 137 bool CheckHMACKeySize(size_t key_size_in_bits, ALG_ID alg) { 367 ALG_ID alg = 0; local 467 ALG_ID alg = 0; local [all...] |